{ "schema_version": "1.4.0", "id": "GHSA-v66v-63h2-8q5q", "modified": "2022-05-01T18:13:14Z", "published": "2022-05-01T18:13:14Z", "aliases": [ "CVE-2007-3386" ], "details": "Cross-site scripting (XSS) vulnerability in the Host Manager Servlet for Apache Tomcat 6.0.0 to 6.0.13 and 5.5.0 to 5.5.24 allows remote attackers to inject arbitrary HTML and web script via crafted requests, as demonstrated using the aliases parameter to an html/add action.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3386" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36001" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10077" }, { "type": "WEB", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00525.html" }, { "type": "WEB", "url": "http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx" }, { "type": "WEB", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795" }, { "type": "WEB", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01192554" }, { "type": "WEB", "url": "http://jvn.jp/jp/JVN%2359851336/index.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html" }, { "type": "WEB", "url": "http://osvdb.org/36417" }, { "type": "WEB", "url": "http://secunia.com/advisories/26465" }, { "type": "WEB", "url": "http://secunia.com/advisories/26898" }, { "type": "WEB", "url": "http://secunia.com/advisories/27037" }, { "type": "WEB", "url": "http://secunia.com/advisories/27267" }, { "type": "WEB", "url": "http://secunia.com/advisories/27727" }, { "type": "WEB", "url": "http://secunia.com/advisories/28317" }, { "type": "WEB", "url": "http://secunia.com/advisories/33668" }, { "type": "WEB", "url": "http://securityreason.com/securityalert/3010" }, { "type": "WEB", "url": "http://securitytracker.com/id?1018558" }, { "type": "WEB", "url": "http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540" }, { "type": "WEB", "url": "http://tomcat.apache.org/security-6.html" }, { "type": "WEB", "url": "http://www.debian.org/security/2008/dsa-1447" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:241" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2007-0871.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/476448/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/500396/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/500412/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/25314" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2007/2880" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2007/3386" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2007/3527" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2009/0233" } ], "database_specific": { "cwe_ids": [ "CWE-79" ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2007-08-14T22:17:00Z" } }